User

Internet Revolution

On May 26, the District Court found in the In Re: Capital One Consumer Data Security Breach Litigation that a report prepared by Mandiant concerning the Capital One data breach (Breach Report) was not protected by the work product privilege and must be turned over to Plaintiffs. What are some lessons to be learned from this data breach […]

Background checks represent a moment in time, but continuous monitoring that listens to a candidate's data over time, looking and identifying changes in their background to mitigate risk is the future.

The National Institute of Standards and Technology (NIST) is looking for public and private sector experts to take part in an exercise that will evaluate the digital forensics community’s ability to conduct mobile- and computer-based investigations.

The Cybersecurity and Infrastructure Security Agency (CISA) has launched CISA Central, a hub for staying on top of threats and emerging risks to the nation’s critical infrastructure, whether they’re of cyber, communications or physical origin.

Google Threat Analysis Group researchers warn that Chinese and Iranian hackers are targeting campaign staffers for both President Donald Trump and Presidential candidate Joe Biden with phishing emails.

Nearly 80% of the companies surveyed had experienced at least one cloud data breach in the past 18 months, and nearly half (43%) reported 10 or more breaches, according to a new study from Ermetic and intelligence firm IDC.

Elizabeth “Beth” Lindsay-Wood, MBA, CHCIO, has joined Moffitt Cancer Center as vice president and chief information officer (CIO). She will be responsible for leading Moffitt’s information technology teams and preparing the organization to accelerate its digital transformation.

It is no secret that finding and recruiting strong Chief Information Security Officer (CISO) candidates is far from easy. Many CISOs typically stay in a role for a few years and subsequently are not able to dedicate adequate time to the development of junior leaders who could become the next wave of security leaders. Most organizations […]